SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING COURSE PLAN Course Code : SE1102 Course Title : NETWORKS SECURITY Semester : IV Course Time : FEB MAY 2016 Day A & B Secti Hour Timing DAY 1 6 1.25-2.15 DAY 3 1 8.00-8.50 DAY 4 1 8.00-8.50 Locati : University Building Faculty Details Sec. Office Office hour Mail id A Mrs. Krishnaveni S 1204 UB Mday to Friday Krishnaveni.s@ktr.srmuniv.ac.in 8.35 am to 5.00pm B M.S. Abirami 1204 UB 8.35 am to 5.00pm abirami.ms@ktr.srmuniv.ac.in TEXT BOOK 1. William Stallings, Cryptography & Network Security, Pears Educati, 4th Editi, 2010. 2. William Stallings and Lawrie Brown, Computer Security: Principles and Practice, PHI, 2008. REFERENCE BOOK 1.Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security, Private communicati in public world, PHI, 2nd editi, 2002. 2. Bruce Schneier, Neils Fergus, Practical Cryptography, Wiley Dreamtech India Pvt Ltd, 2003. Douglas R Sims Cryptography Theory and practice, CRC Press, 1995. ONLINE REFERENCES 1. www.williamstallings.com/security2e.html. 2. www.ocw.mit.edu/ocwweb/electrical-engineering-and-computer-science/6 857Fall2003/CourseHome/index.htm. PREREQUISITE: Computer Networks INSTRUCTIONAL OBJECTIVES This course introduces the students about 1. Ability to understand the basic working principles and utilities of various Cryptographic algorithms including secret key cryptography, hashes and message digests, and public key algorithms. 2. Ability to understand design issues and working principles of various authenticati protocols. 3. Ability to understand the design issues and working principles of various Secure communicati standards including Kerberos.
ASSESSMENT DETAILS Cycle Test I - 10 Cycle Test II - 10 Model Exam - 20 Assignment /Surprise Test - 5 Attendance - 5 Test Schedule S.No. DATE TEST TOPICS DURATION 1 As per Calendar Cycle Test - I Unit I & II 2 periods 2 As per Calendar Cycle Test - II Unit III & IV 2 periods 3 As per Calendar Model Exam All 5 units 3 Hrs DETAILED SESSION PLAN UNIT I: CONVENTIONAL AND MODERN ENCRYPTION Model of network security Security attacks, services and attacks OSI security architecture Classical encrypti techniques SDES Block cipher Principles- DES Strength of DES Block cipher design principles Block cipher mode of operati Evaluati criteria for AES RC4 - Differential and linear cryptanalysis Placement of encrypti functi traffic cfidentiality. S. No. TOPIC(S) COVERED EXECUTION METHOD ASSIGNMENT TOPIC 1 Model of network security Security attacks 2 Services and Attacks OSI security architecture 3 Classical Encrypti techniques SDES 4 Block cipher Principles TEXT BOOK/ REFERENCE T1 - William Stallings, Cryptogra phy & Network Security, Pears Educati, 4th Editi, 2010 T1 T1 T1 Assignment Problem 1 PRSENTATI ON/ SUBMISSIO N DUE DATE 3 rd week of feb 2016 COURSE OBJECTI VE 1 d,g EXPEC TED OUTCO ME
5 DES T1 Strength of DES 6 Block T1 cipher design principles and modes of operati 7 Evaluati T1 criteria for AES 8 Differential and linear cryptanalysi s Placement of encrypti functi 9 Traffic Cfidential ity. T1 UNIT II-PUBLIC KEY ENCRYPTION Number Theory Prime number Modular arithmetic Euclid s algorithm - Fermet s and Euler s theorem Primality Chinese remainder theorem Discrete logarithm Public key cryptography and RSA Key distributi Key management Diffie Hellman key exchange Elliptic curve Cryptography 10 Number Theory Prime number 11 Modular arithmetic Euclid s algorithm 12 Fermet s and Euler s theorem 13 Primality Chinese remainder theorem 14 Discrete logarithm 15 Public key cryptography and RSA 16 Key Distributi T1, S Sadagopan, Enterprise Resource Planning, Prentice Hall, 2001 Assignment Problem 2 2 nd week of March 2016 1 a,d,g
Key Managemen t 17 Diffie Hellman key exchange 18 Elliptic curve Cryptography UNIT III-AUTHENTICATION Authenticati requirement Authenticati functi MAC Hash functi Security of hash functi and MAC SHA - HMAC CMAC - Digital signature and authenticati protocols DSS 19 Authenticati Assignment 4 th week of 2 d,e,h requirement Problem 3 March 2016 20 Authenticati functi 21 MAC & Hash functi 22 Security of hash functi and MAC 23 SHA Algorithm 24 HMAC Algorithm 25 CMAC 26 Digital signature and authenticati protocols 27 DSS UNIT IV-SECURITY PRACTICE Authenticati applicatis Kerberos X.509 Authenticati services - E-mail security IP security - Web security. 28 Introducti to Assignment 2 nd week of Authenticati applicatis Problem 4 April 2016 29 Authenticati applicatis 30 Introducti to Kerberos 31 Kerberos applicatis 32 X.509 Authenticati services 3 a,d,e,h,j
33 X.509 Authenticati services 34 E-mail security 35 IP security 36 Web security UNIT V - SYSTEM SECURITY Intruder Intrusi detecti system Virus and related threats Countermeasures Firewalls design principles Trusted systems Practical implementati of cryptography and security. 37 Intruder & T1, T3 - Bret Assignment 4 th week of 3 d,e,h System Security Wagner, EllenMk, ERP, Third Editi Cengage Problem 5 April 2016 38 Intrusi detecti system 39 Virus and related threats 40 Countermeasure s 41 Introducti to Firewalls design principles 42 Sample Firewalls designs 43 Trusted systems 44 Practical implementati of cryptography 45 Practical implementati of Security Learning, 2008 Prepared by Mrs.S.Krishnaveni Approved by HOD/SWE
Assignment Topics:- SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING SE1102 & CS0427-NETWORK SECURITY The class will be divided in to groups and assigned with the following topics and evaluati will be de through presentati of group members Units Topics assigned Applicati 1. Implementati of Block Cipher principles and DES and give its advantage and disadvantage Implementati of AES using an applicati and give its advantage and disadvantage Groups assigned G1, G2 G3,G4 Evaluati through sessi by sessi by I Implementati of RSA using an applicati and give its advantage and disadvantage G5,G6 sessi by Implementati of SDES using an applicati and give its advantage and disadvantage G7,G8 sessi by Encrypti Functi Usage through an applicati with Merits and Demerits G9, G10 sessi by
Unit Topics assigned Applicati Implementati of Euclid s algorithm using the applicati II Implementati of Fermet s and Euler algorithm using the applicati Implementati of Public key cryptography and Private key using the applicati decided in Unit-I Implementati of Diffie Hellmen algorithm using the applicati Implementati of Ellyptic Key cryptography using the applicati Groups assigned G1, G2 G3,G4 G5,G6 G7,G8 G9, G10 Evaluati through sessi by sessi by sessi by sessi by sessi by Unit Topics assigned Applicati Implementati of MAC algorithm using the applicati III Implementati of HMAC algorithm using the applicati Implementati of SHA algorithm using the applicati decided in Unit-I Implementati of CMAC algorithm using the applicati Analyse the Authenticati functi used in your Digital Signature applicati Groups Evaluati assigned through G1, G2 sessi by G3,G4 sessi by G5,G6 sessi by G7,G8 sessi by G9, G10 sessi by
Units IV Topics assigned Email Security/ IP Security/ Web security Implementati wise analysis report Applicati Units Topics assigned Applicati V Firewall Design ccepts, How to detect Intruders through any applicati individually selected by each group members Groups assigned G1 to G10 Groups assigned G1, G2 G3,G4 G5,G6 G7,G8 Evaluati through sessi by Evaluati through sessi by sessi by sessi by sessi by G9, G10 sessi by Staff Signature HOD/SWE